-
1
-
-
3242780292
-
Safeguarding Copyrighted Contents: Digital Libraries and Intellectual Property Management
-
Alrashid 1998 April
-
[Alrashid 1998] Tareq M. Alrashid, James A. Barker, Brian S. Christian, Steven C. Cox, Michael W. Rabne, Elizabeth A. Slotta, and Luella R. Upthegrove, Safeguarding Copyrighted Contents: Digital Libraries and Intellectual Property Management, D-Lib Magazine, (April 1998).
-
(1998)
D-Lib Magazine
-
-
Alrashid, T.M.1
Barker, J.A.2
Christian, B.S.3
Cox, S.C.4
Rabne, M.W.5
Slotta, E.A.6
Upthegrove, L.R.7
-
2
-
-
0004200684
-
-
Anderson 1972 ESD-TR-73-51, Oct. HQ Electronic Systems Division, Hanscom Field, Bedford, MA
-
[Anderson 1972] Investigating the sandbox approach was first suggested in James P. Anderson, Computer Security Technology, ESD-TR-73-51, Vol. II, pp. 58-69, (Oct. 1972) (HQ Electronic Systems Division, Hanscom Field, Bedford, MA).
-
(1972)
Computer Security Technology
, vol.2
, pp. 58-69
-
-
Anderson, J.P.1
-
4
-
-
0031222505
-
Managing Trust in an Information-Labeling System
-
Blaze 1997 September
-
[Blaze 1997] M. Blaze, J. Feigenbaum, P. Resnick, and M. Straus, Managing Trust in an Information-Labeling System, European Transactions on Telecommunications 8(5), 491-501, (September 1997).
-
(1997)
European Transactions on Telecommunications
, vol.8
, Issue.5
, pp. 491-501
-
-
Blaze, M.1
Feigenbaum, J.2
Resnick, P.3
Straus, M.4
-
5
-
-
0029723574
-
A Digital Library System for Periodicals Distribution
-
Choy 1996 Proceedings of ADL96 - A Forum on Research & Technology, IEEE Computer Society Press, Los Alamitos, CA
-
[Choy 1996] D.M. Choy, J.B. Lotspiech, L.C. Anderson, S.K. Boyer, R. Dievendorff, C. Dwork, T.D. Griffin, B.A. Hoenig, M.K. Jackson, W. Kaka, J.M. McCrossin, A.M. Miller, R.J.T. Morris, and N.J. Pass, A Digital Library System for Periodicals Distribution, in Proceedings of ADL96 - A Forum on Research & Technology, Advances in Digital Libraries, IEEE Computer Society Press, Los Alamitos, CA, pp. 95-103, (1996).
-
(1996)
Advances in Digital Libraries
, pp. 95-103
-
-
Choy, D.M.1
Lotspiech, J.B.2
Anderson, L.C.3
Boyer, S.K.4
Dievendorff, R.5
Dwork, C.6
Griffin, T.D.7
Hoenig, B.A.8
Jackson, M.K.9
Kaka, W.10
McCrossin, J.M.11
Miller, A.M.12
Morris, R.J.T.13
Pass, N.J.14
-
6
-
-
3342987108
-
-
Ciccione 1996 private communication, Stefik includes a language sample
-
[Ciccione 1996] B. Ciccione, K. Duong, S. Okamoto, P. Ram, X. Riley, and M. Stefik, The Digital Property Rights Language, private communication, (1996). Stefik includes a language sample.
-
(1996)
The Digital Property Rights Language
-
-
Ciccione, B.1
Duong, K.2
Okamoto, S.3
Ram, P.4
Riley, X.5
Stefik, M.6
-
7
-
-
0041478931
-
Safeguarding Digital Library Contents and Users: Document Access Control
-
Gladney 1997 June
-
[Gladney 1997] H.M. Gladney, Safeguarding Digital Library Contents and Users: Document Access Control, D-Lib Magazine, (June 1997). This is a synopsis of Access Control for Large Collections (ACM Trans. Info. Sys. 15(2), 154-194, (1997)), which shows the database schema alluded to.
-
(1997)
D-Lib Magazine
-
-
Gladney, H.M.1
-
8
-
-
0031118725
-
Access Control for Large Collections
-
[Gladney 1997] H.M. Gladney, Safeguarding Digital Library Contents and Users: Document Access Control, D-Lib Magazine, (June 1997). This is a synopsis of Access Control for Large Collections (ACM Trans. Info. Sys. 15(2), 154-194, (1997)), which shows the database schema alluded to.
-
(1997)
ACM Trans. Info. Sys.
, vol.15
, Issue.2
, pp. 154-194
-
-
-
9
-
-
3242815538
-
Safeguarding Digital Library Contents and Users: A Note on Universal Unique Identifiers
-
Gladney 1998 April
-
[Gladney 1998] H.M. Gladney, Safeguarding Digital Library Contents and Users: a Note on Universal Unique Identifiers, D-Lib Magazine, (April 1998).
-
(1998)
D-Lib Magazine
-
-
Gladney, H.M.1
-
10
-
-
3242765923
-
Charging for Online Content
-
Herzberg 1998 January
-
[Herzberg 1998] A. Herzberg, Charging for Online Content, D-Lib Magazine, (January 1998).
-
(1998)
D-Lib Magazine
-
-
Herzberg, A.1
-
11
-
-
0009972768
-
Safeguarding Digital Library Contents: And Users: Protecting Documents Rather Than Channels
-
Lotspiech 1997 September
-
[Lotspiech 1997] J.B. Lotspiech, U. Kohl, and M.A. Kaplan, Safeguarding Digital Library Contents: and Users: Protecting Documents Rather Than Channels, D-Lib Magazine, (September 1997).
-
(1997)
D-Lib Magazine
-
-
Lotspiech, J.B.1
Kohl, U.2
Kaplan, M.A.3
-
12
-
-
0031682432
-
Secure Execution of Java Applets using a Remote Playground
-
Malkhi 1998 May
-
[Malkhi 1998] D. Malkhi, M.K. Reiter, and A.D. Rubin, Secure Execution of Java Applets using a Remote Playground, 1998 IEEE Symposium on Security and Privacy, 40-51, (May 1998).
-
(1998)
1998 IEEE Symposium on Security and Privacy
, pp. 40-51
-
-
Malkhi, D.1
Reiter, M.K.2
Rubin, A.D.3
-
13
-
-
84958045366
-
Using a High-Performance, Programmable Secure Coprocessor
-
Smith 1998 Anguilla, BWI, Springer-Verlag LNCS, to appear
-
[Smith 1998] S.W. Smith, E.R. Palmer, S.H. Weingart, Using a High-Performance, Programmable Secure Coprocessor, FC98: Proceedings of the Second International Conference on Financial Cryptography. Anguilla, BWI, Springer-Verlag LNCS, 1998 (to appear). S.W. Smith, S.H. Weingart, Building a High-Performance, Programmable Secure Coprocessor, IBM Research Report RC21102, (1997).
-
(1998)
FC98: Proceedings of the Second International Conference on Financial Cryptography
-
-
Smith, S.W.1
Palmer, E.R.2
Weingart, S.H.3
-
14
-
-
8344240024
-
Building a High-Performance, Programmable Secure Coprocessor
-
[Smith 1998] S.W. Smith, E.R. Palmer, S.H. Weingart, Using a High-Performance, Programmable Secure Coprocessor, FC98: Proceedings of the Second International Conference on Financial Cryptography. Anguilla, BWI, Springer-Verlag LNCS, 1998 (to appear). S.W. Smith, S.H. Weingart, Building a High-Performance, Programmable Secure Coprocessor, IBM Research Report RC21102, (1997).
-
(1997)
IBM Research Report RC21102
-
-
Smith, S.W.1
Weingart, S.H.2
-
15
-
-
0003337920
-
Shifting the Possible: How digital property rights challenge us to rethink digital publishing
-
Stefik 1997a
-
[Stefik 1997a] M.Stefik, Shifting the Possible: How digital property rights challenge us to rethink digital publishing, Berkeley Technology Law Journal, 12(1), 137-159, (1997).
-
(1997)
Berkeley Technology Law Journal
, vol.12
, Issue.1
, pp. 137-159
-
-
Stefik, M.1
-
16
-
-
0002822359
-
Trusted Systems
-
Stefik 1997b
-
[Stefik 1997b] M. Stefik, Trusted Systems, Scientific American 276(3), 78-81, (1997).
-
(1997)
Scientific American
, vol.276
, Issue.3
, pp. 78-81
-
-
Stefik, M.1
-
17
-
-
0041980099
-
The Internet Knowledge Manager: Dynamic Digital Libraries, and Agents You Can Understand
-
Walker 1998 March
-
[Walker 1998] A. Walker, The Internet Knowledge Manager: Dynamic Digital Libraries, and Agents You Can Understand, D-Lib Magazine, (March 1998). The Internet Knowledge Manager, and its Use for Rights and Billing in Digital Libraries. Proc First International Conference on the Practical Applications of Knowledge Management, March 1998.
-
(1998)
D-Lib Magazine
-
-
Walker, A.1
-
18
-
-
3342949147
-
The Internet Knowledge Manager, and its Use for Rights and Billing in Digital Libraries
-
March
-
[Walker 1998] A. Walker, The Internet Knowledge Manager: Dynamic Digital Libraries, and Agents You Can Understand, D-Lib Magazine, (March 1998). The Internet Knowledge Manager, and its Use for Rights and Billing in Digital Libraries. Proc First International Conference on the Practical Applications of Knowledge Management, March 1998.
-
(1998)
Proc First International Conference on the Practical Applications of Knowledge Management
-
-
-
19
-
-
0023247815
-
Physical Security for the microABYSS System
-
Weingart 1987 Oakland, CA, April
-
[Weingart 1987] S.H. Weingart, Physical Security for the microABYSS System, Proceedings of the 1987 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 52-58, (April 1987).
-
(1987)
Proceedings of the 1987 IEEE Symposium on Security and Privacy
, pp. 52-58
-
-
Weingart, S.H.1
-
20
-
-
0023171210
-
ABYSS: A Trusted Architecture for Software Protection
-
White 1987 Oakland, CA, April
-
[White 1987] S.R.White and L. Comerford, ABYSS: A Trusted Architecture for Software Protection, Proceedings of the 1987 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 38-51, (April 1987).
-
(1987)
Proceedings of the 1987 IEEE Symposium on Security and Privacy
, pp. 38-51
-
-
White, S.R.1
Comerford, L.2
|